Most of the propositions, after the Arabic letter reached a position of integrity and proficiency, the calligrapher turned to the production of calligraphic formations in various aesthetic and expressive forms, investing the spiritual energies in what these calligraphic compositions show in artistic paintings. It carries a lot of meanings that are embodied in linear formations, and in order to reach these expressions and know the effective positions of space, this research is concerned with studying these technical treatments. The first chapter included the research problem, which included a question about the effectiveness of space in the linear painting, the importance of research and the temporal and spatial boundaries. As for the second chapter, it contained three sections: the first topic included the role of space in the arts and how to deal with it in the arts, the second topic the emergence of linear painting and the third topic the role of space in the linear achievement and its relationship to artistic foundations in achieving balance, sovereignty, repetition and unity, indicating the effectiveness of space and its active role In the linear achievement, the third chapter was represented by the research procedures and identification of the community, which amounted to (50) written paintings distributed among the types of paintings and from different spatial boundaries, which were characterized by an effective space representing the skill of the calligraphers of those creative paintings, five models were selected on which the analysis was conducted and the researcher adopted The descriptive approach in analyzing the samples, and the analysis concluded to a number of results that were clarified through the fourth chapter, the space has effectively contributed to achieving the balance of the painting and the rest of the elements, as the space formed a point of visual polarization and attractiveness through the organization and through its dominance in the painting, as well as the researcher recommended a set of commandments concerning Scientific research for the sake of knowledge balance and the research was ended with recommendations and suggestions that contribute to achieving the research goals.
A new type of the connected domination parameters called tadpole domination number of a graph is introduced. Tadpole domination number for some standard graphs is determined, and some bounds for this number are obtained. Additionally, a new graph, finite, simple, undirected and connected, is introduced named weaver graph. Tadpole domination is calculated for this graph with other families of graphs.
Schemata are the underlying connections that allow new experience and information to be aligned with previous knowledge. When one reads a text he usually uses all his levels of schemata. Schemata enable us to make sense of what is perceived and experienced in the world.
In poetry, readers usually examine carefully and deeply what they are reading in comparison with other sorts of discourse. Coherence is achieved when a reader perceives connections among schemata. It is a connection between linguistic and textual features of the text, and reader's mental expectations as well as stored knowledge of the world. This paper discusses the role of schematic correlation in poetry, and the effect of different schematic background and diffe
... Show MoreThe present paper studies the use of adjectives in Shakespeare's Sonnets (4, 5, 6, & 9), which are chosen randomly, on the three levels: grammar, lexis and conversation. It tackles adjectives as a literary term with presenting their forms and functions. The presentation is done according to the themes, their forms and functions in conversation, the adjectives are shown in this paper as for their forms, frequency and meanings in the sonnets and their effects on studying. The analysis is done according to Quirk et al. (1985) and Quirk and Greenbaum (1973). Then, all adjectives have been calculated in the sonnets. The results of the analysis have shown that compound adjectives which occurred (31) are used more than the Suffixation
... Show MoreAdvertisement is a general phenomenon in our everyday life. In most cases, it is established for commercial purposes i.e. it is oriented for certain goals and waiting for results. One form of advertisement is a blurb. In this study, the researcher applies Fonton and Saint-Dizier (2010) and Hymes (1962) models on 23 blurbs. These two models are chosen on consideration of accounting grammatical categories and speech events respectively. The study tends to answer the following question: How do blurb’s writers exploit language to convince the reader to buy the intended book? Therefore, the aim of the study can be stated as analyzing the blurbs according to these two models and finding which category scores higher and serves in ad
... Show MoreTuberculosis continues to be the leading cause of morbidity and mortality, with an estimated annual incidence of 10.4 million worldwide. It has been estimated that 10% of patients with extrapulmonary tuberculosis have musculoskeletal involvement, with the spine being the most common. Spinal tuberculosis (TB) accounts for 50% of cases of musculoskeletal tuberculosis.
Spinal tuberculosis is the result of infection with Mycobacterium tuberculosis. It is a secondary infection, the primary lesion of which is in the lungs, genitourinary system, or gastrointestinal tract and can be active or latent. Involvement of the vertebral segment is the result of hematogenous spread of infection along the arterial pathway or Batson's vei
... Show MoreBecloud stupefy computing is solid buzzword in the trade. It is timeless in which the advantage seat be leveraged on sound out miserable take into consideration reducing the indict and complication of grant providers. Cloud computing promises to curtail truly and opinionated retrench and approximately specifically concede IT departments focusing on moral projects as contrasted with of misery datacenters contention, It is unconditionally with than on the up internet. Give are sundry consequences of this put together. For the actuality remodeling in turn flock cause get revenge buyer be attractive to. This implies ramble they chaperone custody of servers, they carry out software updates and assistant on the condense user pay
... Show MoreMedical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show MoreThe primary goal of the study is to practise some systematic strategies for foreign language instruction despite the fact that no single approach to language classroom instruction is inherently superior to others; instead the choice of an approach should be determined by the teacher, students, the subject matter, and the situation. The paper adopts certain strategies which may assist EFL teachers to excel in their work and continue their professional development. Hence, it is intended for language teachers who understand the value of good teaching and like to produce academically successful students. The study could also help college student teachers to acquire new strategies in order not only to succeed but also to excel in their learni
... Show More